期刊文献+

Authenticated Key Agreement Protocols: A Comparative Study

Authenticated Key Agreement Protocols: A Comparative Study
下载PDF
导出
摘要 One of the most important and challenging cryptographic primitives in Public Key Cryptography is Key Agreement Protocol where two or more parties share secret values and establish the session key. Many authors have proposed key agreement protocols. In this article, we have viewed some authenticated Key Agreement Protocols and presented a comparative study. We have also described the design principle, security requirement and various attacks on Key Agreement Protocol. One of the most important and challenging cryptographic primitives in Public Key Cryptography is Key Agreement Protocol where two or more parties share secret values and establish the session key. Many authors have proposed key agreement protocols. In this article, we have viewed some authenticated Key Agreement Protocols and presented a comparative study. We have also described the design principle, security requirement and various attacks on Key Agreement Protocol.
出处 《Journal of Information Security》 2015年第1期51-58,共8页 信息安全(英文)
关键词 Impersonation RESILIENCE PRIME FACTORIZATION ECDLP TRAPDOOR Function Impersonation Resilience Prime Factorization ECDLP Trapdoor Function
  • 相关文献

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部